Research Article

Integrating Traffics with Network Device Logs for Anomaly Detection

Table 2

Detailsof the network device logs.

Firewall logsTraffic logsEvent logsNetwork
logs
Security logsSystem
logs
Cron logsMail logsMessages
logs
Mysqld
logs

Data
Time
Module
Level
PID
Type
Action
Source
Destination
Translated Source
Translated Destination
Duration
Bytes Sent
Bytes Received
Application
Reason